tmux-real-user-testing
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The skill uses
evalto execute strings generated by thescripts/tmux-real-user-log.shhelper script. It also dynamically assembles shell commands to be executed within detachedtmuxsessions. - [DATA_EXPOSURE_AND_EXFILTRATION]: The skill is designed to capture and log TUI screen contents during sensitive workflows such as
/author authentication dialogs. These snapshots are saved as plain-text files (tmux-readable-full.log) in the localtmp/directory, which may lead to the exposure of credentials, tokens, or private configuration data displayed on screen. - [COMMAND_EXECUTION]: Instructions guide the agent to run commands with the flag
--approval-mode yolo, which is intended to suppress user confirmation and bypass safety gates within the application under test. - [INDIRECT_PROMPT_INJECTION]:
- Ingestion points: Untrusted data from terminal output is ingested into the agent context via
tmux capture-pane(found inSKILL.mdandscripts/tmux-real-user-log.sh). - Boundary markers: Absent. The agent relies on simple
grepor string matching on raw terminal output to determine its next actions. - Capability inventory: The skill has the ability to send arbitrary keys to a terminal, execute shell commands, and manage filesystem artifacts.
- Sanitization: None. Captured terminal output is treated as trusted state information for the test loop.
Audit Metadata